U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

CVE-2022-50576 Detail

Description

In the Linux kernel, the following vulnerability has been resolved: serial: pch: Fix PCI device refcount leak in pch_request_dma() As comment of pci_get_slot() says, it returns a pci_device with its refcount increased. The caller must decrement the reference count by calling pci_dev_put(). Since 'dma_dev' is only used to filter the channel in filter(), we can call pci_dev_put() before exiting from pch_request_dma(). Add the missing pci_dev_put() for the normal and error path.


Metrics

NVD enrichment efforts reference publicly available information to associate vector strings. CVSS information contributed by other sources is also displayed.
CVSS 4.0 Severity and Vector Strings:

NIST CVSS score
NIST: NVD
N/A
NVD assessment not yet provided.

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to [email protected].

URL Source(s) Tag(s)
https://git.kernel.org/stable/c/07f4ca68b0f6bf84b6b391c14b59fd179fcde9c5 kernel.org
https://git.kernel.org/stable/c/4f5d28865c665c9064de631a518f9bc8099d9ce4 kernel.org
https://git.kernel.org/stable/c/516614a371c26e3334625b4bca19a5362bf658d6 kernel.org
https://git.kernel.org/stable/c/56e5a7c5ee3f0dc8978b5df2b1a98a1b060c5e2a kernel.org
https://git.kernel.org/stable/c/6f7d82380fbeaed3a940efc33c23f0c4bbd0fc02 kernel.org
https://git.kernel.org/stable/c/8be3a7bf773700534a6e8f87f6ed2ed111254be5 kernel.org
https://git.kernel.org/stable/c/90ff030ca10b69feeebda1427550ebf9ed2ad868 kernel.org
https://git.kernel.org/stable/c/d165388227aa7e46a9751b90bae6337b5335cdbb kernel.org
https://git.kernel.org/stable/c/dfd15c5550b9190d5b0f9bcacb3e6436322f3854 kernel.org

Weakness Enumeration

CWE-ID CWE Name Source

Change History

1 change records found show changes

Quick Info

CVE Dictionary Entry:
CVE-2022-50576
NVD Published Date:
10/22/2025
NVD Last Modified:
10/22/2025
Source:
kernel.org